CVE-2023-53799
crypto: api - Use work queue in crypto_destroy_instance
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: crypto: api - Use work queue in crypto_destroy_instance The function crypto_drop_spawn expects to be called in process context. However, when an instance is unregistered while it still has active users, the last user may cause the instance to be freed in atomic context. Fix this by delaying the freeing to a work queue.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Dec 9, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
6bfd48096ff8ecabf955958b51ddfa7988eb0a14 < 625bf86bf53eb7a8ee60fb9dc45b272b77e5ce1c 6bfd48096ff8ecabf955958b51ddfa7988eb0a14 < 048545d9fc6424b0a11e7e8771225bb9afe09422 6bfd48096ff8ecabf955958b51ddfa7988eb0a14 < c4cb61c5f976183c07d16b0071f0c60bc212ef1f 6bfd48096ff8ecabf955958b51ddfa7988eb0a14 < 867a146690960ac7b89ce40f4ee60dd32eeb1682 6bfd48096ff8ecabf955958b51ddfa7988eb0a14 < c0dbcebc7f390ec7dbe010dcc22c60f0c6bfc26d 6bfd48096ff8ecabf955958b51ddfa7988eb0a14 < 9ae4577bc077a7e32c3c7d442c95bc76865c0f17
Linux / Linux
2.6.19
References
git.kernel.org: https://git.kernel.org/stable/c/625bf86bf53eb7a8ee60fb9dc45b272b77e5ce1c git.kernel.org: https://git.kernel.org/stable/c/048545d9fc6424b0a11e7e8771225bb9afe09422 git.kernel.org: https://git.kernel.org/stable/c/c4cb61c5f976183c07d16b0071f0c60bc212ef1f git.kernel.org: https://git.kernel.org/stable/c/867a146690960ac7b89ce40f4ee60dd32eeb1682 git.kernel.org: https://git.kernel.org/stable/c/c0dbcebc7f390ec7dbe010dcc22c60f0c6bfc26d git.kernel.org: https://git.kernel.org/stable/c/9ae4577bc077a7e32c3c7d442c95bc76865c0f17